Evaluation and consideration of multiple responses. Kazunori Fujiwara, JPRS OARC 28

Size: px
Start display at page:

Download "Evaluation and consideration of multiple responses. Kazunori Fujiwara, JPRS OARC 28"

Transcription

1 Evaluation and consideration of multiple responses Kazunori Fujiwara, JPRS OARC 28

2 Past discussion Background DNS is query response based protocol Each query contains one QNAME / QTYPE pair Recent applications request multiple DNS queries. For example, dual stack host (IPv4 and IPv6) requires both IPv4 address (type A) and IPv6 address (type AAAA) There have been many proposals to optimize the situation ( QDCOUNT > 1 ) New Query Type that queries both A and AAAA (similar to MAILB or ANY) New DNS protocol that carry multiple queries / responses Pre-populate resolver s cache Copyright 2018 Japan Registry Services Co., Ltd. 2

3 Recent multiple response proposals draft-vavrusa-dnsop-aaaa-for-free Additional AAAA in answer section draft-wkumari-dnsop-multiple-responses Pseudo RR controls additional RRs draft-fujiwara-dnsop-additional-answers Developers choose additional RRs (+NSEC*) draft-bellis-dnsext-multi-qtypes New EDNS option carries additional qtypes draft-yao-dnsop-accompanying-questions New EDNS option carries additional qnames, qtypes, rcodes Copyright 2018 Japan Registry Services Co., Ltd. 3

4 Recent multiple response proposals draft-vavrusa-dnsop-aaaa-for-free These Additional two drafts AAAA propose in answer new section DNS protocol that draft-wkumari-dnsop-multiple-responses carry multiple queries/responses in EDNS0 We Pseudo need RR to develop controls additional new resolvers RRs to evaluate Evaluation is not easy, not tested yet draft-fujiwara-dnsop-additional-answers Developers choose additional RRs (+NSEC*) draft-bellis-dnsext-multi-qtypes New EDNS option carries additional qtypes draft-yao-dnsop-accompanying-questions New EDNS option carries additional qnames, qtypes, rcodes Copyright 2018 Japan Registry Services Co., Ltd. 4

5 Recent multiple response proposals draft-vavrusa-dnsop-aaaa-for-free Additional AAAA in answer section draft-wkumari-dnsop-multiple-responses Pseudo RR controls additional RRs draft-fujiwara-dnsop-additional-answers Developers choose additional RRs (+NSEC*) draft-bellis-dnsext-multi-qtypes These 3 drafts propose additional RRs in responses Pre-populate New EDNS resolvers' option carries cache additional approach qtypes Query draft-yao-dnsop-accompanying-questions is not changed Authoritative New EDNS server option implementation carries additional is qnames, easy Can qtypes, evaluate rcodes current full-resolver implementations Copyright 2018 Japan Registry Services Co., Ltd. 5

6 draft-fujiwara-dnsop-additional-answers proposes adding NSEC in Responses RFC 8198: Aggressive Use of DNSSEC- Validated Cache RFC 8198 enabled NODATA response generation from cached matching NSEC v6.example. IN NSEC zz.example. AAAA RRSIG NSEC If the NSEC RR in the cache, resolvers can generate NODATA of v6.example. A immediately Copyright 2018 Japan Registry Services Co., Ltd. 6

7 Idea: Pre-populate resolvers' cache Full-service resolver 2. Query: AAAA root com Cache (Assumption#2 Accept?) 4. AAAA A? Assumption #1 Delay between queries 1. AAAA AAAA RR (some delay) 6. A A RR or NODATA example.com (patched auth. server) 3. Response: AAAA (Answer) A (Additional) or NSEC Copyright 2018 Japan Registry Services Co., Ltd. 7

8 Possible additional answer pairs Query: additional answer name A: name AAAA (answer section) name A: name AAAA (additional section) name A: name NSEC* (authority section) name AAAA: name A (additional section) name AAAA: name NSEC* (authority section) Existing case of current implementation name MX: mail_exchange A/AAAA (additional) name SRV: target_host A/AAAA (additional) Different QNAME scenario name A/AAAA: _443._tcp.name TLSA/NSEC* _443._tcp.name TLSA: name A/AAAA/NSEC* Copyright 2018 Japan Registry Services Co., Ltd. 8

9 the evaluation Full-service resolvers accept additional Resource Records? (To check assumption 2) Purpose of the evaluation To check easy deployment If existing resolvers accept additional RRs in responses, deployment is easy Updating authoritative server is easy To know implementation status of RFC 8198 Copyright 2018 Japan Registry Services Co., Ltd. 9

10 Authoritative server implementation NSD (4.1.19) is easy to read and patch Add a code at add_rrset() in nsd/query.c Always add A / AAAA / NSEC RRs add_rrset( ) {. switch (rrset_rrtype(rrset)) { case TYPE_A: rrset2 = domain_find_rrset(owner, query->zone, TYPE_AAAA); if (rrset2) { Or ANSWER_SECTION (aaaa for free) answer_add_rrset(answer, ADDITIONAL_A_SECTION, owner, rrset2); } else { answer_nodata(query, answer, owner); // add NSEC* (and SOA) } break; Copyright 2018 Japan Registry Services Co., Ltd. 10

11 Experiment authoritative servers Patched NSD ( ) appends A,AAAA in additional section, NSEC in authority section additonal.dnslab.jp and additional-nosec.dnslab.jp zones both.additional{,-nosec}.dnslab.jp has both A, AAAA (+NSEC) v6.additional{,-nosec}.dnslab.jp has AAAA only (+NSEC) v4.additional{,-nosec}.dnslab.jp has A only (+NSEC) Signed with NSEC (additional.dnslab.jp) Try drill -D -o both.additional.dnslab.jp A drill -D -o v4.additional.dnslab.jp A Patched NSD ( ) appends A,AAAA in answer section (aaaa-for-free scenario) answer-aaaa.dnslab.jp and answer-aaaa-nosec.dnslab.jp zones both.answer-aaaa{,-nosec}.dnslab.jp has both A,AAAA Try drill -D -o both.answer-aaaa.dnslab.jp A Copyright 2018 Japan Registry Services Co., Ltd. 11

12 Tested resolvers BIND BIND rc1 (v9_12 branch at March 6, 2018) Support RFC 8198 (NSEC) Knot Resolver Knot Resolver Supports RFC 8198 (NSEC) Unbound Unbound 1.7.0rc1 Supports RFC 8198 (NSEC): aggressive-nsec: yes PowerDNS Recursor Google Public DNS Copyright 2018 Japan Registry Services Co., Ltd. 12

13 Test result BIND 9, Google Public DNS don t accept/use all additional RRs (A, AAAA, NSEC) Unbound, Knot Resolver don t accept/use additional A, AAAA accept additional NSEC in authority section Knot resolver and Unbound 1.7.0rc1 generate NODATA using cached NSEC RR PowerDNS recursor does not accept/use A,AAAA in additional section accepts additional A,AAAA in answer section (with/without dnssec) Copyright 2018 Japan Registry Services Co., Ltd. 13

14 Reson of rejecting additional RRs Current full-service resolver implementations reject additional RRs because they avoid cache poisoning Recent full-service resolvers accept RRs that match query (QNAME, QTYPE) Even if additional RRs are DNSSEC signed Small/minimal response size is preferred Copyright 2018 Japan Registry Services Co., Ltd. 14

15 Summary Pre-populate resolvers' cache approach requires updating resolver software to accept additional RRs Written in Section Ranking Data of RFC 2181 and Section 8 of draft-wkumari-dnsopmultiple-responses-05 Knot resolver and Unbound 1.7.0rc1 accept additional NSEC RRs and generate NODATA responses (a half of additional-answer scenario) PowerDNS recursor accepts additional A/AAAA in answer section (aaaa-for-free scenario) Copyright 2018 Japan Registry Services Co., Ltd. 15

16 Next steps? My intent is to increase the effect of RFC 8198 Another (minimal) proposal maybe Aggressive append NSEC* by authoritative server Accept additional NSEC* by full-service resolver that support RFC 8198 Copyright 2018 Japan Registry Services Co., Ltd. 16

RFC 2181 Ranking data and referrals/glue importance --- new resolver algorithm proposal ---

RFC 2181 Ranking data and referrals/glue importance --- new resolver algorithm proposal --- RFC 2181 Ranking data and referrals/glue importance --- new resolver algorithm proposal --- Kazunori Fujiwara fujiwara@jprs.co.jp Japan Registry Services Co., Ltd (JPRS) DNS-OARC Workshop 2016/10/16 Last

More information

QNAME minimisation. Ralph Dolmans (NLnet Labs) https://www.nlnetlabs.nl/ March 2016 Stichting NLnet Labs

QNAME minimisation. Ralph Dolmans (NLnet Labs) https://www.nlnetlabs.nl/ March 2016 Stichting NLnet Labs QNAME minimisation Ralph Dolmans ralph@nlnetlabs.nl (NLnet Labs) March 2016 Stichting NLnet Labs page 2 Introduction About NLnet Labs A not for profit, public benefit foundation develop Open Source software

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. Google July 2017

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. Google July 2017 Internet Engineering Task Force (IETF) Request for Comments: 8198 Updates: 4035 Category: Standards Track ISSN: 2070-1721 K. Fujiwara JPRS A. Kato Keio/WIDE W. Kumari Google July 2017 Aggressive Use of

More information

A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover

A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover A Look at RFC 8145 Trust Anchor Signaling for the 2017 KSK Rollover Duane Wessels DNS-OARC 26 San Jose, CA September 29, 2017 Background 2 2017 Root Zone KSK Rollover October 11, 2017! Root zone DNSKEY

More information

Expires: June 16, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003

Expires: June 16, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003 DNS Extensions Internet-Draft Expires: June 16, 2004 R. Arends Telematica Instituut M. Larson VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003 Protocol Modifications for the DNS

More information

Internet Engineering Task Force (IETF) Request for Comments: E. Hunt ISC January 2019

Internet Engineering Task Force (IETF) Request for Comments: E. Hunt ISC January 2019 Internet Engineering Task Force (IETF) Request for Comments: 8482 Updates: 1034, 1035 Category: Standards Track ISSN: 2070-1721 J. Abley Afilias O. Gudmundsson M. Majkowski Cloudflare Inc. E. Hunt ISC

More information

CNAME-based Redirection Design Notes

CNAME-based Redirection Design Notes CNAME-based Redirection Design Notes When we configure a redirect type of local-zone or access-control action, we might want to specify a CNAME as the action data, whose canonical name is managed by an

More information

Implementing DNSSEC with DynDNS and GoDaddy

Implementing DNSSEC with DynDNS and GoDaddy Implementing DNSSEC with DynDNS and GoDaddy Lawrence E. Hughes Sixscape Communications 27 December 2017 DNSSEC is an IETF standard for adding security to the DNS system, by digitally signing every resource

More information

Is your DNS server up-to-date? Pieter Lexis Senior PowerDNS Engineer April 22 nd 2018

Is your DNS server up-to-date? Pieter Lexis Senior PowerDNS Engineer April 22 nd 2018 lieter_ PowerDNS pieterlexis PowerDNS Is your DNS server up-to-date? Pieter Lexis Senior PowerDNS Engineer April 22 nd 2018 1 What s all this about? A DNS recap What is EDNS? Issues with EDNS on the internet

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice ISSN: March 2017

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice ISSN: March 2017 Internet Engineering Task Force (IETF) Request for Comments: 8109 BCP: 209 Category: Best Current Practice ISSN: 2070-1721 P. Koch DENIC eg M. Larson P. Hoffman ICANN March 2017 Initializing a DNS Resolver

More information

DNS Flag day. A tale of five cctlds. Hugo Salgado,.CL Sebastián Castro,.NZ DNS-OARC 29, Amsterdam

DNS Flag day. A tale of five cctlds. Hugo Salgado,.CL Sebastián Castro,.NZ DNS-OARC 29, Amsterdam DNS Flag day A tale of five cctlds Hugo Salgado,.CL Sebastián Castro,.NZ DNS-OARC 29, Amsterdam 1 What is EDNS? RFC 6891 Defines a backward compatible mechanism to signal support for new DNS options Original

More information

Expires: November 15, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST May 17, 2004

Expires: November 15, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST May 17, 2004 DNS Extensions Internet-Draft Expires: November 15, 2004 R. Arends Telematica Instituut M. Larson VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST May 17, 2004 Protocol Modifications for the DNS

More information

DNS DNS DNS Summer Days 2013 Copyright

DNS DNS DNS Summer Days 2013 Copyright DNS DNS 2013 7 19 DNS Summer Days 2013 JPRS @OrangeMorishita Copyright 2013 1 : 1965 9 21 47 : 7 Copyright 2013 2 Copyright 2013 3 DNS Summer Days 2012 DNS 1 DNS RFC 2181 Copyright 2013 4 DNS Summer Days

More information

DNS. Some advanced topics. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.2, 2017/09/25 12:41:57)

DNS. Some advanced topics. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.2, 2017/09/25 12:41:57) DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 17.2, 2017/09/25 12:41:57) Friday, September 22, 2017 Karst Koymans (UvA) DNS Friday, September 22, 2017 1

More information

Re-engineering the DNS One Resolver at a Time. Paul Wilson Director General APNIC channeling Geoff Huston Chief Scientist

Re-engineering the DNS One Resolver at a Time. Paul Wilson Director General APNIC channeling Geoff Huston Chief Scientist Re-engineering the DNS One Resolver at a Time Paul Wilson Director General APNIC channeling Geoff Huston Chief Scientist 1 In this presentation I ll talk about the DNS, and the root server infrastructure

More information

Root Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail

Root Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail What is DNS? Systems to convert domain names into ip addresses: For an instance; www.tashicell.com 118.103.136.66 Reverse: 118.103.136.66 www.tashicell.com DNS Hierarchy Root Servers The top of the DNS

More information

RIPE Network Coordination Centre. K-root and DNSSEC. Wolfgang Nagele RIPE NCC.

RIPE Network Coordination Centre. K-root and DNSSEC. Wolfgang Nagele RIPE NCC. K-root and DNSSEC Wolfgang Nagele RIPE NCC RIPE NCC One of the five Regional Internet Registries Provides IP address and AS number resources to Europe and Middle-East regions DNS related work - Parent

More information

Intended status: Best Current Practice Expires: February 12, S. Krishnaswamy. Parsons. August 11, 2016

Intended status: Best Current Practice Expires: February 12, S. Krishnaswamy. Parsons. August 11, 2016 DNSOP Internet-Draft Intended status: Best Current Practice Expires: February 12, 2017 W. Hardaker Parsons O. Gudmundsson CloudFlare S. Krishnaswamy Parsons August 11, 2016 DNSSEC Roadblock Avoidance draft-ietf-dnsop-dnssec-roadblock-avoidance-05.txt

More information

Internet-Draft Intended status: Informational Expires: September 19, 2016 March 18, 2016

Internet-Draft Intended status: Informational Expires: September 19, 2016 March 18, 2016 Network Working Group Internet-Draft Intended status: Informational Expires: September 19, 2016 K. Fujiwara JPRS A. Kato Keio/WIDE March 18, 2016 Aggressive use of NSEC/NSEC3 draft-fujiwara-dnsop-nsec-aggressiveuse-03

More information

IPv6 How-To for a Registry 17th CENTR Technical Workshop

IPv6 How-To for a Registry 17th CENTR Technical Workshop IPv6 How-To for a Registry 17th CENTR Technical Workshop Amsterdam, October 2007 Alvaro Vives (alvaro.vives@consulintel.es) Jordi Palet (jordi.palet@consulintel.es) Introduction Main steps to be undertaken

More information

Protecting Privacy: The Evolution of DNS Security

Protecting Privacy: The Evolution of DNS Security Protecting Privacy: The Evolution of DNS Security Burt Kaliski Senior Vice President and CTO, Verisign NSF Technology Transfer to Practice in Cyber Security Workshop November 4, 2015 Agenda DNS Overview

More information

The ISP Column A column on things Internet. Three DNS articles: 3. Helping Resolvers to help the DNS. RFC8192 Aggressive NSEC Caching

The ISP Column A column on things Internet. Three DNS articles: 3. Helping Resolvers to help the DNS. RFC8192 Aggressive NSEC Caching The ISP Column A column on things Internet Geoff Huston November 2017 Three DNS articles: 3. Helping Resolvers to help the DNS In this final article of a trio that looks at today s hot topics in the DNS,

More information

DNSSEC at Scale. Dani Grant CloudFlare

DNSSEC at Scale. Dani Grant CloudFlare DNSSEC at Scale Dani Grant DNS @ CloudFlare CloudFlare - Authoritative DNS provider (includes DNSSEC for free) - 4M+ domains - 40+ billion queries per day - 76 edge locations in 40 countries (growing)

More information

Managing Caching DNS Server

Managing Caching DNS Server This chapter explains how to set the Caching DNS server parameters. Before you proceed with the tasks in this chapter, see Introduction to the Domain Name System which explains the basics of DNS. Configuring

More information

DNSSECbis Lookaside Validation. Peter Losher Internet Systems Consortium (November 2006)

DNSSECbis Lookaside Validation. Peter Losher Internet Systems Consortium (November 2006) DNSSECbis Lookaside Validation Peter Losher Internet Systems Consortium (November 2006) Topics Introduction DNS Delegation and Resolution DNSSECbis Data and Traversal DLV Overview

More information

Network Working Group

Network Working Group Network Working Group R. Arends Request for Comments: 4035 Telematica Instituut Obsoletes: 2535, 3008, 3090, 3445, 3655, 3658, R. Austein 3755, 3757, 3845 ISC Updates: 1034, 1035, 2136, 2181, 2308, 3225,

More information

The impact of DNSSEC on k.root-servers.net and ns-pri.ripe.net

The impact of DNSSEC on k.root-servers.net and ns-pri.ripe.net The impact of DNSSEC on k.root-servers.net and ns-pri.ripe.net Olaf M. Kolkman Question What would be the immediate and initial effect on memory, CPU and bandwidth resources if we were to deploy DNSSEC

More information

Some advanced topics. Karst Koymans. Tuesday, September 16, 2014

Some advanced topics. Karst Koymans. Tuesday, September 16, 2014 DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 44, 2014/09/15 08:39:47) Tuesday, September 16, 2014 Karst Koymans (UvA) DNS Tuesday, September 16, 2014 1

More information

BIND-USERS and Other Debugging Experiences. Mark Andrews Internet Systems Consortium

BIND-USERS and Other Debugging Experiences. Mark Andrews Internet Systems Consortium BIND-USERS and Other Debugging Experiences Mark Andrews Internet Systems Consortium Mark_Andrews@isc.org http://isc.org BIND-USERS and Other Debugging Experiences We will look at some typical debugging

More information

Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014

Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014 Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder System and Network Engineering July 2014 DNS Main Components Server Side: Authoritative Servers Resolvers (Recursive Resolvers, cache) Client

More information

Network Working Group Request for Comments: 5155 Category: Standards Track Nominet D. Blacka VeriSign, Inc. March 2008

Network Working Group Request for Comments: 5155 Category: Standards Track Nominet D. Blacka VeriSign, Inc. March 2008 Network Working Group Request for Comments: 5155 Category: Standards Track B. Laurie G. Sisson R. Arends Nominet D. Blacka VeriSign, Inc. March 2008 DNS Security (DNSSEC) Hashed Authenticated Denial of

More information

Internet-Draft Obsoletes: 7816 (if approved) Intended status: Standards Track Expires: January 18, 2019 July 17, 2018

Internet-Draft Obsoletes: 7816 (if approved) Intended status: Standards Track Expires: January 18, 2019 July 17, 2018 Network Working Group S. Bortzmeyer Internet-Draft AFNIC Obsoletes: 7816 (if approved) P. Hoffman Intended status: Standards Track ICANN Expires: January 18, 2019 July 17, 2018 Abstract DNS Query Name

More information

DNS. dr. C. P. J. Koymans. September 16, Informatics Institute University of Amsterdam. dr. C. P. J. Koymans (UvA) DNS September 16, / 46

DNS. dr. C. P. J. Koymans. September 16, Informatics Institute University of Amsterdam. dr. C. P. J. Koymans (UvA) DNS September 16, / 46 DNS dr. C. P. J. Koymans Informatics Institute University of Amsterdam September 16, 2008 dr. C. P. J. Koymans (UvA) DNS September 16, 2008 1 / 46 DNS and BIND DNS (Domain Name System) concepts theory

More information

DNS. Karst Koymans & Niels Sijm. Friday, September 14, Informatics Institute University of Amsterdam

DNS. Karst Koymans & Niels Sijm. Friday, September 14, Informatics Institute University of Amsterdam DNS Karst Koymans & Niels Sijm Informatics Institute University of Amsterdam Friday, September 14, 2012 Karst Koymans & Niels Sijm (UvA) DNS Friday, September 14, 2012 1 / 32 1 DNS on the wire 2 Zone transfers

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice ISSN: January 2019

Internet Engineering Task Force (IETF) Request for Comments: Category: Best Current Practice ISSN: January 2019 Internet Engineering Task Force (IETF) P. Hoffman Request for Comments: 8499 ICANN BCP: 219 A. Sullivan Obsoletes: 7719 Updates: 2308 K. Fujiwara Category: Best Current Practice JPRS ISSN: 2070-1721 January

More information

Table of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS. Root servers.

Table of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS. Root servers. Table of Contents Specification and implementation DNS Karst Koymans Informatics Institute University of Amsterdam (version 1.11, 2010/10/04 10:03:37) Tuesday, September 14, 2010 A short history of DNS

More information

Introduction to the DANE Protocol And Updates From IETF 88

Introduction to the DANE Protocol And Updates From IETF 88 Introduction to the DANE Protocol And Updates From IETF 88 Dan York, Senior Content Strategist Internet Society ICANN 48, Buenos Aires, Argentina November 20, 2013 A Quick Overview of DANE www.internetsociety.org

More information

Who s Asking? Geoff Huston, Joao Damas APNIC. Roy Arends ICANN

Who s Asking? Geoff Huston, Joao Damas APNIC. Roy Arends ICANN Who s Asking? Geoff Huston, Joao Damas APNIC Roy Arends ICANN Background Experiments that are intended to expose the way in which recursive resolvers interact with the DNS root and its authoritative servers

More information

DNSSEC KSK-2010 Trust Anchor Signal Analysis

DNSSEC KSK-2010 Trust Anchor Signal Analysis DNSSEC KSK-2010 Trust Anchor Signal Analysis MAPRG @ IETF102 1 Overview Background: DNSSEC KSK rollover and plan Problems with the KSK rollover Case study analysis: difficulty in identifying old Trust

More information

Transaction oriented DNS flow analysis (WIP)

Transaction oriented DNS flow analysis (WIP) Transaction oriented DNS flow analysis (WIP) Shigeya Suzuki / Bill Manning WIDE Project USC/ISI & Keio University + Auto-ID Labs Japan CAIDA Workshop 2006 @ISI, March 17th 2006 Topics Current on-going

More information

Table of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS.

Table of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS. Table of Contents Specification and implementation DNS dr. C. P. J. Koymans Informatics Institute University of Amsterdam September 14, 2009 A short history of DNS Root servers Basic concepts Delegation

More information

Table of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS. Root servers.

Table of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS. Root servers. Table of Contents Specification and implementation DNS Karst Koymans Informatics Institute University of Amsterdam (version 1.20, 2011/09/26 13:56:09) Tuesday, September 13, 2011 A short history of DNS

More information

Response Differences between NSD and other DNS Servers

Response Differences between NSD and other DNS Servers Response Differences between NSD and other DNS Servers Jelte Jansen, NLnet Labs Wouter Wijngaards, NLnet Labs NLnet Labs document 2006-004 November 2, 2006 Abstract This note describes observed differences

More information

The DNS Camel. Or How many features can we add to this protocol before it breaks? Bert Hubert /

The DNS Camel. Or How many features can we add to this protocol before it breaks? Bert Hubert / The DNS Camel Or How many features can we add to this protocol before it breaks? Bert Hubert / bert.hubert@powerdns.com 185 RFCs 2781 pages / 166891 lines 888233 words This is 2 times The C++

More information

ARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN

ARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN ARIN Support for DNSSEC and ION San Diego 11 December 2012 Pete Toscano, ARIN 2 DNS and BGP They have been around for a long time. DNS: 1982 BGP: 1989 They are not very secure. Methods for securing them

More information

DNS Survival Guide. Artyom Gavrichenkov

DNS Survival Guide. Artyom Gavrichenkov DNS Survival Guide Artyom Gavrichenkov A bit of a history: DNS 1983: (int32)*host_str; A bit of a history: DNS 1983: (int32)*host_str; 1997-2017: load balancing geobalancing ASN policies

More information

Introduction to the Domain Name System

Introduction to the Domain Name System The Domain Name System (DNS) handles the growing number of Internet users. DNS translates names, such as www.cisco.com, into IP addresses, such as 192.168.40.0 (or the more extended IPv6 addresses), so

More information

What's so hard about DNSSEC? Paul Ebersman May 2016 RIPE72 Copenhagen

What's so hard about DNSSEC? Paul Ebersman May 2016 RIPE72 Copenhagen What's so hard about DNSSEC? Paul Ebersman Paul_Ebersman@cable.comcast.com 23-27 May 2016 RIPE72 Copenhagen 1 Why use DNSSEC What does it solve? Helps against cache poisoning Identifies DNS lying Enables

More information

Table of Contents. DNS security. Alternative DNS security mechanism. DNSSEC specification. The long (and winding) road to the DNSSEC specification

Table of Contents. DNS security. Alternative DNS security mechanism. DNSSEC specification. The long (and winding) road to the DNSSEC specification Table of Contents DNS security Karst Koymans Informatics Institute University of Amsterdam (version 1.19, 2011/09/27 14:18:11) Friday, September 23, 2011 The long (and winding) road to the DNSSEC specification

More information

DNSSEC Trust tree: (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d

DNSSEC Trust tree:  (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d DNSSEC Trust tree: www.dnslab.org. (A) ---dnslab.org. (DNSKEY keytag: 7308 alg ---dnslab.org. (DNSKEY keytag: 9247 ---dnslab.org. (DS keytag: 9247 dig DNSSEC ---org. (DNSKEY keytag: 24209 a Domain Name

More information

Falling Trees or If a DNS Server is Lame but Nobody Queries It, Should You Send an ?

Falling Trees or If a DNS Server is Lame but Nobody Queries It, Should You Send an  ? Falling Trees or If a DNS Server is Lame but Nobody Queries It, Should You Send an E-mail? Shane Kerr DNS Working Group, RIPE 59 Lisbon, 2009-10-08 Background The RIPE NCC implemented a

More information

Measuring the effects of DNSSEC deployment on query load

Measuring the effects of DNSSEC deployment on query load Measuring the effects of DNSSEC deployment on query load Jelte Jansen NLnet Labs NLnet Labs document 26-2 May 1, 26 Abstract Ripe NCC recently started signing the zones on their DNS servers. This document

More information

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008 Objectives Discuss the basics of the Domain Name System (DNS) and its

More information

DoH and DoT experience. Ólafur Guðmundsson Marek Vavrusa

DoH and DoT experience. Ólafur Guðmundsson Marek Vavrusa DoH and DoT experience Ólafur Guðmundsson Marek Vavrusa Announced April 1 st 2018 Our mission: to help build a better Internet. We use 1.1.1.1 and 1.0.0.1 (easy to remember) for our resolver. DNS resolver,

More information

DNSSEC: what every sysadmin should know to keep things working

DNSSEC: what every sysadmin should know to keep things working DNSSEC: what every sysadmin should know to keep things working Roland van Rijswijk - Deij roland.vanrijswijk@surfnet.nl About SURFnet National Research and Education Network (NREN) Founded in 1986 > 11000km

More information

DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber

DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber (ralf.weber@nominum.com) Who is Nominum? Mission Product Leadership Industry Expertise Deliver the Trusted Internet Experience Strategic Partners:

More information

Experience with 8 bit label in JP Zone

Experience with 8 bit label in JP Zone Experience with 8 bit label in JP Zone 1st August 2004 IEPG Meeting Yoshiro YONEYA Japan Registry Service Overview Introduction Specification Result of Survey Observed effects 2 Introduction

More information

Root KSK Roll Update Webinar

Root KSK Roll Update Webinar Root KSK Roll Update Webinar Matt Larson, VP of Research 11 October 2017 1 Who has KSK-2017 configured as a trust anchor? Until recently, there was no way to know which trust anchors validators have configured

More information

Domain Name System Security

Domain Name System Security Slide title 70 pt APITALS Domain Name System Security e subtitle um 30 pt Bengt Sahlin Ericsson Research NomadicLab Bengt.Sahlin@ericsson.com Objectives Provide DNS basics, essential for understanding

More information

Internet Engineering Task Force (IETF) Request for Comments: 7706 Category: Informational ISSN: November 2015

Internet Engineering Task Force (IETF) Request for Comments: 7706 Category: Informational ISSN: November 2015 Internet Engineering Task Force (IETF) Request for Comments: 7706 Category: Informational ISSN: 2070-1721 W. Kumari Google P. Hoffman ICANN November 2015 Decreasing Access Time to Root Servers by Running

More information

Measurement of BGP Anycast effects experiences in.jp

Measurement of BGP Anycast effects experiences in.jp Measurement of BGP Anycast effects experiences in.jp Adding an anycast node at New York Kazunori Fujiwara Masato Minda, Shinta Sato, Izuru Shirai, Takayasu Matsuura Japan Registry

More information

DNS Security DNSSEC. *http://compsec101.antibo zo.net/papers/dnssec/dnss ec.html. IT352 Network Security Najwa AlGhamdi

DNS Security DNSSEC. *http://compsec101.antibo zo.net/papers/dnssec/dnss ec.html. IT352 Network Security Najwa AlGhamdi DNS Security DNSSEC *http://compsec101.antibo zo.net/papers/dnssec/dnss ec.html 1 IT352 Network Security Najwa AlGhamdi Introduction DNSSEC is a security extensions to the DNS protocol in response to the

More information

Flexible Testbed for Recursive Resolver Software

Flexible Testbed for Recursive Resolver Software Flexible Testbed for Recursive Resolver Software Paul Hoffman DNS-OARC 27, San Jose, CA 30 September 2017 v1 1 Overview The resolver server testbed The test root creator Use case: getting ready for the

More information

Test cases for domain checks a step towards a best prac5ce. Mats Du(erg,.SE Sandoche Balakrichenan, AFNIC

Test cases for domain checks a step towards a best prac5ce. Mats Du(erg,.SE Sandoche Balakrichenan, AFNIC Test cases for domain checks a step towards a best prac5ce Mats Du(erg,.SE Sandoche Balakrichenan, AFNIC Zonemaster Upcoming tool for test of delegacon of a domain The development of Zonemaster has several

More information

WE POWER YOUR MOBILE WORLD ENUM INTEGRATION MANUAL

WE POWER YOUR MOBILE WORLD ENUM INTEGRATION MANUAL ENUM INTEGRATION MANUAL 1 CONTENTS INTRODUCTION... 3 CONNECTIVITY... 3 TECHNICAL SPECIFICATION... 4 Valid format for ENUM server query... 4 ENUM server responses... 6 ENUM responses in case of error processing

More information

A paper on DNSSEC - NSEC3 with Opt-Out

A paper on DNSSEC - NSEC3 with Opt-Out A paper on DNSSEC - NSEC3 with Opt-Out DNSSEC A Way Forward for TLD Registries Method for faster adoption of DNSSEC Providing greater security with minimal impact on customers, registries and Zone Management

More information

Domain Name System Security

Domain Name System Security Domain Name System Security T-110.4100 Tietokoneverkot September 2010 Bengt Sahlin 2011/09/27 Bengt Sahlin 1 Objectives Provide DNS basics, essential for understanding DNS security

More information

Multi Provider DNSSEC draft-huque-dnsop-multi-provider-dnssec-02. Shumon Huque March 22 nd 2018 DNSOP Working Group, IETF101, London, U.K.

Multi Provider DNSSEC draft-huque-dnsop-multi-provider-dnssec-02. Shumon Huque March 22 nd 2018 DNSOP Working Group, IETF101, London, U.K. Multi Provider DNSSEC draft-huque-dnsop-multi-provider-dnssec-02 Shumon Huque March 22 nd 2018 DNSOP Working Group, IETF101, London, U.K. Note to the DNS Camel* This document does not propose any new extensions

More information

DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs)

DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) olaf@nlnetlabs.nl Stichting NLnet Labs page 2 Registrars/ Registrants DNS Architecture As friend secondary As ISP Cache server Registry DB primary As

More information

An Overview of DNSSEC. Cesar Diaz! lacnic.net!

An Overview of DNSSEC. Cesar Diaz! lacnic.net! An Overview of DNSSEC Cesar Diaz! cesar@ lacnic.net! 1 DNSSEC??? The DNS Security Extension (DNS SEC) attach special kind of information called criptographic signatures to the queries and response that

More information

Rolling the Root KSK. Geoff Huston. APNIC Labs. September 2017

Rolling the Root KSK. Geoff Huston. APNIC Labs. September 2017 Rolling the Root KSK Geoff Huston APNIC Labs September 2017 Will this break the Internet? Why? If we stuff up this trust anchor key roll then resolvers that perform DNSSEC validation will fail to provide

More information

22/06/ :37 DNS COMPLIANCE. Fred Baker Internet Systems Consortium

22/06/ :37 DNS COMPLIANCE. Fred Baker Internet Systems Consortium DNS COMPLIANCE Fred Baker Internet Systems Consortium Background - 2014 ISC was in the process of adding DNS COOKIE (RFC 7873) to BIND and we wanted to see how many servers would mishandle DNS COOKIE options

More information

IDN query trends seen at JP and Root. Kazunori Fujiwara, JPRS 2016/4/3, IEPG meeting

IDN query trends seen at JP and Root. Kazunori Fujiwara, JPRS 2016/4/3, IEPG meeting IDN query trends seen at JP and Root Kazunori Fujiwara, JPRS fujiwara@jprs.co.jp 2016/4/3, IEPG meeting Is IDN use increasing? It is said that IDN is important for non- English speakers IDN implementations

More information

Domain Name System - Advanced Computer Networks

Domain Name System - Advanced Computer Networks - Advanced Computer Networks Saurabh Barjatiya International Institute Of Information Technology, Hyderabad 26 August, 2011 Contents 1 Distributed database, highly volatile Domain names Top level domains

More information

DNS. A Massively Distributed Database. Justin Scott December 12, 2018

DNS. A Massively Distributed Database. Justin Scott December 12, 2018 DNS A Massively Distributed Database Justin Scott December 12, 2018 What is DNS? Translates Hostnames to IP Addresses What is DNS? Example: www.serverlogic.com 23.185.0.4 What is DNS? Example: www.serverlogic.com

More information

Internet Engineering Task Force (IETF) Request for Comments: 8509 Category: Standards Track. Google December 2018

Internet Engineering Task Force (IETF) Request for Comments: 8509 Category: Standards Track. Google December 2018 Internet Engineering Task Force (IETF) Request for Comments: 8509 Category: Standards Track ISSN: 2070-1721 G. Huston J. Damas APNIC W. Kumari Google December 2018 A Root Key Trust Anchor Sentinel for

More information

DNSSEC for ISPs workshop João Damas

DNSSEC for ISPs workshop João Damas DNSSEC for ISPs workshop João Damas (joao@isc.org) 1 Outline of workshop Brief intro to DNSSEC Overview of zone signing DNSSEC validation trust anchors validation impact of enabling validation debugging

More information

DNS Anycast Statistic Collection

DNS Anycast Statistic Collection DNS Anycast Statistic Collection RIPE 61 Measurement Analysis and Tools Working Group 18 Nov 2010 Edward Lewis Neustar 1 What s so hard about reporting? 2 Collecting DNS Statistics (Generic) The Technical

More information

DNSSEC Validators Requirements

DNSSEC Validators Requirements DNSSEC Validators Requirements draft-mglt-dnsop-dnssec-validator-requirements-05 Migault, Lewis, York IETF99 ToC Time Requirements Trust Anchor Requirements Bootstrapping / configuration TA Datastore Interaction

More information

DNSSEC en.mx. Network Information Center México

DNSSEC en.mx. Network Information Center México DNSSEC en.mx Network Information Center México 2 Agenda 1. About NIC México 2..mx DNSSEC test bed 3. Education about DNSSEC 4. NSEC zone walking 3 About NIC México cctld operator of.mx (México). National

More information

Toward Unspoofable Network Identifiers. CS 585 Fall 2009

Toward Unspoofable Network Identifiers. CS 585 Fall 2009 Toward Unspoofable Network Identifiers CS 585 Fall 2009 The Problem DNS Spoofing Attacks (e.g., Kaminsky) At link (Ethernet) and IP layers, either: Software sets the source address in the packet, or Software

More information

ICANN DNSSEC Workshop Comcast s Operational Experiences 14 March 2012

ICANN DNSSEC Workshop Comcast s Operational Experiences 14 March 2012 ICANN DNSSEC Workshop Comcast s Operational Experiences 14 March 2012 NATIONAL ENGINEERING & TECHNICAL OPERATIONS DNSSEC Deployment Status We began working on this in 2008 (see Bmeline) We completed our

More information

DNSSEC for the Root Zone. ICANN 37 Nairobi March 2010

DNSSEC for the Root Zone. ICANN 37 Nairobi March 2010 DNSSEC for the Root Zone ICANN 37 Nairobi March 2010 Kim Davies, ICANN This design is the result of a cooperation between ICANN & VeriSign with support from the U.S. DoC NTIA Design Design Requirements

More information

Assessing and Improving the Quality of DNSSEC

Assessing and Improving the Quality of DNSSEC Assessing and Improving the Quality of DNSSEC Deployment Casey Deccio, Ph.D. Sandia National Laboratories AIMS-4 CAIDA, SDSC, San Diego, CA Feb 9, 2012 Sandia is a multiprogram laboratory operated by Sandia

More information

Algorithm for DNSSEC Trusted Key Rollover

Algorithm for DNSSEC Trusted Key Rollover Algorithm for DNSSEC Trusted Key Rollover Gilles Guette, Bernard Cousin, and David Fort IRISA, Campus de Beaulieu, 35042 Rennes CEDEX, FRANCE {gilles.guette, bernard.cousin, david.fort}@irisa.fr Abstract.

More information

Step by step DNSSEC deployment in.se. Anne-Marie Eklund Löwinder Quality & Security

Step by step DNSSEC deployment in.se. Anne-Marie Eklund Löwinder Quality & Security Step by step DNSSEC deployment in.se Anne-Marie Eklund Löwinder Quality & Security Manager,.SE amel@iis.se @amelsec www.iis.se Timeline 2005 signing of the.se zone. 2006 allowing DS records from friendly

More information

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF

More information

DNS Sessions. - where next? OARC 27 San Jose, Sep Sep 2017, San Jose. DNS OARC 27

DNS Sessions. - where next? OARC 27 San Jose, Sep Sep 2017, San Jose. DNS OARC 27 DNS Sessions - where next? Sara Dickinson sara@sinodun.com OARC 27 San Jose, Sep 2017 1 Overview A tour of the evolution of doing DNS over session based protocols Recent use cases for DNS Sessions Trade-offs

More information

Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson

Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson Keeping DNS parents and children in sync at Internet Speed! Ólafur Guðmundsson olafur@cloudflare.com How long does it take to? Post a new selfie on Facebook and all your friends to be notified few seconds

More information

Ebook: DNS FUNDAMENTALS. From a Technical Dow Street, Manchester, NH USA

Ebook: DNS FUNDAMENTALS. From a Technical Dow Street, Manchester, NH USA 8 Ebook: DNS FUNDAMENTALS From a Technical Perspective 603 668 4998USA 150 Dow Street, Manchester, NH 03101 150 Dow Street, Manchester, NH 03101 USA DNS Fundamentals From a Technical Perspective Introduction:

More information

DNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO

DNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO DNS Workshop @CaribNOG12 Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO DNS Refresher and Intro to DNS Security Extension (DNSSEC) Outline Introduction DNSSEC mechanisms to establish authenticity and

More information

Domain Name Service. DNS Overview. October 2009 Computer Networking 1

Domain Name Service. DNS Overview. October 2009 Computer Networking 1 Domain Name Service DNS Overview October 2009 Computer Networking 1 Why DNS? Addresses are used to locate objects (contain routing information) Names are easier to remember and use than numbers DNS provides

More information

Root KSK Roll Delay Update

Root KSK Roll Delay Update Root KSK Roll Delay Update Data is good! David Conrad, CTO (channeling Roy Arends, ICANN Principal Research Scientist) 12 November 2017 1 Background When you validate DNSSEC signed DNS records, you need

More information

Domain Name System (DNS) Session-1: Fundamentals. Joe Abley AfNOG Workshop, AIS 2017, Nairobi

Domain Name System (DNS) Session-1: Fundamentals. Joe Abley AfNOG Workshop, AIS 2017, Nairobi Domain Name System (DNS) Session-1: Fundamentals Joe Abley AfNOG Workshop, AIS 2017, Nairobi Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved

More information

Packet Traces from a Simulated Signed Root

Packet Traces from a Simulated Signed Root Packet Traces from a Simulated Signed Root Duane Wessels DNS-OARC DNS-OARC Workshop Beijing, China November 2009 Background We know from active measurements that some DNS resolvers cannot receive large

More information

Internet Engineering Task Force (IETF) Request for Comments: ISSN: K. Fujiwara JPRS December 2015

Internet Engineering Task Force (IETF) Request for Comments: ISSN: K. Fujiwara JPRS December 2015 Internet Engineering Task Force (IETF) Request for Comments: 7719 Category: Informational ISSN: 2070-1721 P. Hoffman ICANN A. Sullivan Dyn K. Fujiwara JPRS December 2015 DNS Terminology Abstract The DNS

More information

I certify that this DNS record set is correct Problem: how to certify a negative response, i.e. that a record doesn t exist?

I certify that this DNS record set is correct Problem: how to certify a negative response, i.e. that a record doesn t exist? RRSIG: I certify that this DNS record set is correct Problem: how to certify a negative response, i.e. that a record doesn t exist? NSEC: I certify that there are no DNS records (of type X) whose record

More information

Managing Resource Records

Managing Resource Records CHAPTER 16 This chapter explains how to configure some of the more advanced DNS zone and server parameters by using the Cisco Prime Network Registrar web UI and CLI. Before you proceed with the concepts

More information

DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010

DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010 DNS Security and DNSSEC in the root zone Luzern, Switzerland February 2010 Kim Davies Manager, Root Zone Services Internet Corporation for Assigned Names & Numbers Recap DNS originally not designed with

More information

ECE 435 Network Engineering Lecture 7

ECE 435 Network Engineering Lecture 7 ECE 435 Network Engineering Lecture 7 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 September 2018 HW#3 was Posted Announcements 1 HW#2 Review C code will be discussed next

More information